Author
Listed:
- Swawon Mondal
(Maulana Abul Kalam Azad University of Technology, Department of Computer Science and Engineering)
- Priya Das
(Chakdaha College, Department of Computer Science)
- Sohail Saif
(Maulana Abul Kalam Azad University of Technology, Department of Computer Applications)
- Ramesh Saha
(Indian Institute of Information Technology (IIIT) Sonepat, Department of Computer Science and Engineering)
- Shakir Khan
(Imam Mohammad Ibn Saud Islamic University (IMSIU), College of Computer and Information Sciences
University Centre for Research and Development, Chandigarh University)
Abstract
One of the popular applications of the Internet of Things (IoT) is the IoT healthcare system. IoT healthcare system improves healthcare services by providing real-time patient monitoring and communication between patients and healthcare providers. IoT healthcare system uses different medical devices and sensors that send sensitive patient data to a centralized server or platform that uses different analytical approaches to assess patients’ health conditions but the communication of IoT devices suffers from privacy and security issues. As IoT applications are taking considerable growth, hackers are using different tactics to attack the systems. It can cause data breaches, operational damage, and reputational damage. A data breach leads to the exposure of sensitive health information and operational damage can interrupt the functionality of medical devices. IoT infrastructures are frequently targeted by threats such as Distributed Denial of Service (DDoS), Denial of Service (DoS), ransomware, and botnet intrusions. IoT systems require proactive security measures to protect them from such threats. One of the security solutions of IoT healthcare systems is the Intrusion Detection System (IDS). IDS alerts users or takes preventive measures by detecting suspicious behaviors or patterns. IDS has many challenges like less number of datasets, misjudgment, and lack of real-time response, etc., so researchers are working on that. In recent times, there are lots of artificial intelligence-based IoT healthcare system Intrusion Detection System has been proposed. In this chapter, we present a case study on various artificial intelligence algorithms and datasets for IoT healthcare system IDS. This chapter will help researchers to see the current trends in algorithms and datasets and also help to find scopes to work in the future.
Suggested Citation
Swawon Mondal & Priya Das & Sohail Saif & Ramesh Saha & Shakir Khan, 2026.
"AI Enabled Intrusion Detection Systems for IoT Healthcare: Current Trends, Challenges, and Future Opportunities,"
Springer Optimization and Its Applications, in: Shreya Banerjee & Sayantani Saha & Suparna Biswas & Narayan C. Debnath (ed.), AI in Smart and Secure Healthcare, pages 279-307,
Springer.
Handle:
RePEc:spr:spochp:978-3-032-15092-9_11
DOI: 10.1007/978-3-032-15092-9_11
Download full text from publisher
To our knowledge, this item is not available for
download. To find whether it is available, there are three
options:
1. Check below whether another version of this item is available online.
2. Check on the provider's
web page
whether it is in fact available.
3. Perform a
for a similarly titled item that would be
available.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:spochp:978-3-032-15092-9_11. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.